CN1703698A - Context information management in a communication device - Google Patents

Context information management in a communication device Download PDF

Info

Publication number
CN1703698A
CN1703698A CN200380100834.XA CN200380100834A CN1703698A CN 1703698 A CN1703698 A CN 1703698A CN 200380100834 A CN200380100834 A CN 200380100834A CN 1703698 A CN1703698 A CN 1703698A
Authority
CN
China
Prior art keywords
contextual information
communication facilities
information
restrict access
content supplier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200380100834.XA
Other languages
Chinese (zh)
Inventor
杰罗姆·沃热德斯
迈克尔·科特金
阿里尔·帕什坦
约瑟夫·沃德卡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Publication of CN1703698A publication Critical patent/CN1703698A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Abstract

A method (200) for context information management in a communication device includes a first step (202) of providing contextual information in the communication device that can be downloaded by a content provider. A next step (208) includes assigning access limitations to the contextual information. A next step (218) includes filtering a request for contextual information from a content provider with the access limitations from the previous step to identify contextual information that is permissible to be downloaded. A next step (220) includes sending the identified permissible contextual information to the content provider.

Description

Context information management in the communication facilities
Technical field
The present invention relates generally to control the information in the communication facilities.More specifically, the present invention relates to contextual information in the managing communication devices.
Background technology
With respect to former only call function of calling, new wireless telephonic characteristics and standard have promoted the function of phone sharp.Such new feature and function comprise, for example, and explorer function, radio multimedium, smart phone and visual telephone.These demands provide by various different pieces of information services and agreement.HRPD (high rate packet data), data and Flame Image Process, global system for mobile communications (GSM), GPRS (GPRS), Global Link strengthen data evolution (EDGE), the third generation mobile data service that is used for universal mobile telephone service (UMTS), GPS (GPS) service, arrive local Connection Service, multimedia card and a plurality of high processing capacity of computing machine or peripheral hardware, all need wireless telephone to handle the data message that receives, and make it be rendered as the preferred format of being convenient to the user.Such formatting procedure is that the parameter by defined radio words contextual information provides.
There is too much contextual information to use on the communication facilities, but currently also do not have method to come addressing to wish to use a plurality of entities of this information.And the final use and the definite formatting procedure of user's information do not known to offer by content supplier.Consider the available information that quantitatively differs widely and have the wireless telephonic broad combination of difference in functionality, the multiple mode of the pleased presentation information of user, this just becomes complicated more.A kind of option of content supplier provides and relates to user's a whole set of information to information requirements.But this just requires wireless telephone to download all such information, then it is filtered into the form of wanting, and this can waste data throughout.The another kind of option of content supplier be with information block for the imagination form and wish that the wireless telephone of end subscriber can be provided by the information that is provided.Certainly, may not can work like this, and this has stoped the user information correction must be fit to their taste always.
Problem resides in these fields: mobile user data service and via such as the information transmission of user data Exchange Service such as GSM, GPRS, EDGE, UMTS, GPS or make the user can utilize mobile device (ME) other data, services as " data modem unit " of classification, access, Multimedia Message and the various media contents of download.Relevant with this problem is to provide distribution to be suitable for the function of the wireless context information of individual's inquiry according to requestor's the identity and the environment of end subscriber.According to a cover right and the permission that the mobile subscriber determines, other people or mobile service can be allowed to or not be allowed to check position or other contextual informations.This will make mobile subscriber's context be maintained secrecy like that according to desirable.
For example, the user of communication facilities such as wireless telephonic user, may would rather limit or retrain the visit to its position, environment or other contextual informations of some individual, service or content supplier.For example, Tracking Company should be after work just can not access context information, perhaps the user would rather be restricted to the visit of the contextual information of its communication facilities, these contents are included in individual connection book or " good friend " tabulation.Therefore, wish to limit individual, service or content supplier to the position of user communication device or the availability of other contextual informations according to a cover right and standard that the mobile subscriber determines.
Therefore, need a kind of method and system, be used for placing (contextualize) among the context presenting to wireless telephonic information.Also need to have permission and the restrict access relevant with contextual some aspect.Specifically, these aspects will comprise communication device position or environmental context.
Description of drawings
The present invention is believed that the feature with novelty will set forth in claims.By the following explanation of reference, and in conjunction with the accompanying drawings, may understand the present invention and further target and advantage best, in the accompanying drawings, similar reference number indicates identical element, wherein:
Fig. 1 is the simplified block diagram according to communication system of the present invention;
Fig. 2 is the rough schematic view according to communication facilities of the present invention; With
Fig. 3 is the process flow diagram that carries out the method for context information management according to the present invention, in communication facilities.
Embodiment
The invention provides a kind of method and system, be used for placing context presenting to wireless telephonic information.Relevant with this contextual information is permission, right and the restrict access relevant with some aspect of context.These permissions or right are suitable for the request corresponding to unique individual or service or content supplier.Specifically, these aspects can comprise position, timing or the environmental context of user communication device.
Advantageously, the present invention can be used in any movement station or communication facilities, such as wireless telephone, PDA(Personal Digital Assistant), palm PC (Pocket PC) or notebook computer, wherein exist wireless data environment to provide or some constraint that permission or display radio user are provided with for the user and the contextual information of permission.Specifically, any provider of CDMA/GSM/3G cellular handset or CDMA/GSM/3G subscriber unit (for example PDA) can use the present invention.In addition, content and application developers also will be to hereinafter distribution and extendability exert an influence basically.
Fig. 1 has represented the overview that has the communication system of network and user interactions according to of the present invention.The communications infrastructure 104,106 that communication system 100 comprises communication facilities 102 (for example wireless telephone) and helps to communicate by letter between communication facilities 102 and the content supplier 108.Communication facilities 102 configurations are used to use network wireless (over-the-air) agreement that information and data transmission are arrived gateway 104 (for example base station).This connection can be in any communications systems standard, and can be connected to for example wide area network (WAN).Communication facilities 102 can also dispose and be used for being fit to local the connection, such as being connected to Local Area Network.This connection can be wired or wireless.Individual or service provider are summarised as the category of content supplier 108, usually by context Control Server 106 and gateway 104 accessing communication equipment 102.
Communication facilities 102 has the contextual information relevant with communication facilities, and can download data or the application program that can be revised by contextual information from gateway 104, WAN or LAN.Communication facilities 102 comprises the user interface that the information that receives is presented to the user.Communication facilities 102 is mapped to various different content provider with restrict access, thereby controls to the visit of contextual information.Communication facilities 102 filters request to contextual information with restrict access, thereby identification allows the contextual information that allows any particular content provider check.In other words, receive user preference that the information based on contextual information limits and through filtering or format.User preference (restrict access) comprises and depends on rule: the environment of communication device position, communication facilities, operate in existing application program and (time of day) constantly on the communication facilities.
In the operation, communication facilities has predetermined contextual information parameters.Expand existing contextual information service so that the mobile subscriber sets up various standards, thereby allow the group (for example unique individual, customized service, service or content supplier or the like) of certain user's appointment to visit its contextual information (for example environment, position, constantly).These standards are determined by user phone configuration and user preference.Restrict access can be the specific request of being correlated with or be mapped to particular content provider or content supplier 108, and it can be asked to revise from the contextual information of communication facilities and be used for the content that presented by communication facilities.And then by token (token) transmission, the control of visit can be safe, as being used for network access protocol.
In fact context information can comprise this locality storage of permission/restrict access in the equipment 102 or be mapped to the remote storage of contextual information of the entity of various requests visits.For example, but be used for the context Control Server 106 of the contextual information remote storage of user or equipment at the gateway 104 or the communications infrastructure.
Referring to Fig. 2, communication facilities 102 is cell phone normally, and it has internal bus, is used for cellular internal part being linked together and being connected to user interface 28.Internal bus is subjected to the control of CPU (central processing unit) (CPU) or controller 22.The storer 27 that has the wireless telephone Control Software and comprise contextual information is connected to internal bus, and control and information transmission to cellular telephone function are provided.The wireless RF subsystem is connected to antenna 20 by transceiver 21.Wireless subsystem is worked under the control of wireless telephone Control Software storer according to standard cellular telephone control interface standard.User interface 28 is also worked on cellular internal bus, and comprises input and output device, such as microphone, loudspeaker, keyboard, display, for simplicity, does not show these equipment.
Storer 27 arranges to be used to comprise the contextual information of communication facilities 102, and this information can be passed through downloaded by content supplier.Controller 22 is mapped to various content suppliers with restrict access, and to control to the visit of contextual information, filter request has the contextual information of restrict access, thus the contextual information that identification allows any particular content provider to check.Controller 22 is storage access restriction and contextual information in storer 27, and wherein Xu Ke contextual information can be used for content supplier, can download to the requestor by the transceiver circuit 20,21 of equipment 102.Alternatively, transmitter can send content supplier's information requested renewal in the constantly different and restrict access permission that restrict access limited.
In fact, restrict access can change according to following aspect: the environment of communication device position, communication facilities, operate in existing application on the communication facilities, constantly.This can comprise the variation in the format.The user can use user interface 28 to come the manual allocation restrict access.Replacedly, restrict access can be used as the part of automatic operation and distributes.Preferably, restrict access can comprise security protocol, is used for limiting the visit to contextual information in the communication facilities.For example, can access to your password or equipment can transmit token to context information request person before allowing contextual access.
Be used to allow the parameter of contextual access or standard to be based on some user-defined preferences.A preference is limited by user or communication device position.For example, constantly can relate to the user position.In other words, the user still is at work and depends on constantly, and this can be limited (for example, After Hours, having only the kinsfolk can access context information) by user's preference.Another preference is that the environment by user or communication facilities is limited.For example, can predict the visit to contextual information on mobile subscriber's existing context, mobile subscriber's existing context can be that any amount of position and the environment of comprising (for example, fixedly relatively moves, the relative office of car is family relatively, or the like) in interior thing.
Similarly, can limit visit according to Another Application program (for example, agenda).For example, standard can influence the Another Application program on (leverage) client, such as instant message client that can be used for this or agenda application program.In the example of instant message client, the user may wish to put up notice (for example, presence information) when he leaves.Instant message client can influence other contextual informations or make in conjunction with other contextual informations and be used for the granularity (granularity) of the information that increases or upgrade contextual information by the individual in its contact book or " good friend " tabulation.In the example of agenda, during work, the agenda that business application can calling party, and access context information.Another preference can comprise can access context information group or unique individual.Such preference may further be divided into the specific information request from group or unique individual.Similarly, preference can comprise can access context information various services or application program.Similarly, such preference may further be divided into the specific information request from service or application program.
In all above-mentioned examples, contextual information can be the part restriction.In other words, change granularity all contextual informations, not have such contextual information or the such contextual information of part be specific.This can comprise the format of contextual information (for example, audio frequency, vision, text) or present.For example, user's spouse can receive contextual information (such as the position on the map), and it demonstrates the user in office, and wherein business application can demonstrate the user just in particular conference room to user's the person in charge.As another example, the commercial enterprise of restriction tracking application program can only be in working time access context information.In addition, can so that the granularity of change in information can use.In the example of position, user's position can be specific, for example, the user onboard or the user in particular address.
Be used to allow the parameter of contextual access or standard to be scheduled to, so that to user transparent.Replacedly, access permission can obtain prompting and prepare whether to allow to send this information when each its context is requested.Alternatively, the user can protect access context information implement pin.Similarly, affirmation or token can be associated with access permission, and content-based own.For example, the individual of request user context information will obtain the prompting of password or PIN, if perhaps do not know password, can ask password.This can comprise that the user who separates mutually with contextual information confirms and/or key or token distribution automatically.At this moment, key or token can be managed to the context Control Server of individual's (person-to-person) application program by the individual.According to such method, can control token to context and verify, and token can be based on above-mentioned standard and the termination that expires.In addition, hash (hashing) algorithm that contextual information and key can distributions safe in utilization makes up, and can be checked by the people with key, thereby to its decoding.
In a preferred embodiment, be used to allow the parameter of contextual access or the standard can be based on right that the user proposed and permission and on the frequency of updating context, be restricted.For example, to the request of contextual access, can provide uploading of primary information sometime immediately or in future to content supplier, perhaps provide one group of cycle of contextual information to upgrade, indefinite number of times perhaps carries out preset times periodically or in variable future time.
Fig. 3 has shown the method for carrying out context information management according to the present invention, in portable communication device.First step 202 is included in contextual information is provided in the communication facilities, and it can be downloaded by content supplier.Content supplier can be restricted to individual, personal group, service or content supplier or the like.Next step 208 comprises the restrict access of dividing the pairing contextual information by content supplier or provider's request.Distribute and comprise the restrict access of shining upon qualification by the common request in provider's (that is, the title of provider or sign), the request of specific provider or the provider.Allocation step 208 can be used as one or more automatic operations and finishes, and also can be used as manually-operated and is finished by the user who points out when content supplier's request contexts information.Next step 218 comprises by from the request to contextual information of the restrict access filtering content provider of preceding step, thus the contextual information that the identification Licensing Content Provider is checked.Next step 220 comprises that the contextual information with the permission of identification sends to content supplier.This can also comprise and not send contextual information,, filters out all information that is, perhaps refuses 215 requests.Forwarding step can also be included in the constantly different of restrict access qualification and in the restrict access permission, send content supplier's information requested renewal.
Typically, after step 202 was provided, content supplier will ask 204 contextual informations from communication facilities.Can select to ignore this request, do not provide contextual information or confirm this request, provide contextual information.Usually, restrict access can be the user before request step 204 takes place for provider or request predetermined.Replacedly, restrict access can be set to default.Alternatively, if unqualified any restrict access 206, the user can obtain prompting and come assign access limitations 208 when the request of receiving from content supplier.At this moment, write rule 210, be defined for the restrict access of particular content provider or request.These rules are used for filtration step 218 after a while.Preferably, the restrict access in the allocation step 208 is time correlation.In other words, these rules can change automatically, and it depends on: the existing application of moving on the environment of communication device position, communication facilities, the communication facilities and the moment.Alternatively, the restrict access in the allocation step can comprise request or access to your password 216 by content supplier, with the contextual information in the accessing communication equipment.
In case the rule of defining and asking, the present invention is 212 requests and rule relatively.This comprises that request with provider's accessing communication device context information is mapped to any restrict access of the qualification that is applied to this content supplier, provider or request or request itself.If find the restrict access 214 that provider or request coupling limit in mapping process, method just filters 218 and send 220, and it is at all or part of contextual information of permission.But,, will refuse to ask 215 if in mapping process, do not find coupling.Replacedly, if do not find coupling, just can provide full detail 220 (supposing that if the user wishes to refuse all information transmission this will be restricted to restrict access or default in allocation step 208).
In a preferred embodiment, the present invention also comprises step: content supplier processes the contextual information of 222 contents to be fit to receive from communication facilities, and the load content after will processing then is in communication facilities.Information specific processing can be content-based the requestor and/or owner's preference.
As can be seen from the above, the invention provides a kind of method and system, be used for carrying out context information management at communication facilities.Although show and described specific embodiment of the present invention, can make modification.Therefore, appended claims wishes to contain all such changes and modifications, and it all drops in the broad range of the present invention.

Claims (10)

1. method that is used for carrying out at communication facilities context information management, described method comprises the steps:
Providing in communication facilities can be by the contextual information of content supplier's download;
The restrict access of dividing the pairing contextual information by content supplier;
By the restrict access from preceding step, filtering content provider permits the contextual information of being checked by content supplier to the request of contextual information with identification; With
The contextual information of the permission after the identification is sent to described content supplier.
2. the method for claim 1, wherein after being provided, step also comprises step:
Content supplier's request is from the contextual information of communication facilities;
Described content supplier processes content with the contextual information after suitable the filtration; With
Content after the processing is written into communication facilities.
3. the method for claim 1, wherein the restrict access in the allocation step can be according to following one or more the variation: the environment of communication device position, communication facilities, the existing application of moving on communication facilities, constantly.
4. the method for claim 1, wherein, restrict access in the allocation step is the rule that limits by content supplier's request, and, wherein, after allocation step, also comprise step: with content supplier's sign, provider and request, only one or more in the request are mapped to any suitable restrict access.
5. the method for claim 1, wherein, described allocation step can be finished as one or more automatic operations, and can be as manually-operated, finish by the user who obtains pointing out when content supplier's request contexts information, and, wherein, the restrict access in the allocation step can comprise one or more security protocols, with visit and the format preference of restriction to contextual information in the communication facilities.
6. communication facilities with context information management, described equipment comprises:
Storer is used to comprise the contextual information of communication facilities, and this information can be passed through downloaded by content supplier;
Controller, it is mapped to each content supplier with restrict access, with the visit of control to contextual information, and by the request of restrict access filtration to contextual information, permits the contextual information of being checked by any particular content provider with identification; With
Transmitter, the contextual information of the permission after it will be discerned sends to described content supplier.
7. equipment as claimed in claim 6, wherein, described restrict access can be according to following one or more the variation: the environment of communication device position, communication facilities, the existing application of moving on communication facilities, constantly.
8. equipment as claimed in claim 6, wherein, described transmitter sends institute of content supplier information requested and upgrades the various constantly different of restrict access qualification with when restrict access is permitted.
9. equipment as claimed in claim 6 also comprises user interface, and wherein, described allocation step can be finished as one or more automatic operations, and can be as manually-operated, finish by described user interface by the user.
10. equipment as claimed in claim 6, wherein, described restrict access can comprise one or more security protocols, with visit and the format preference of restriction to contextual information in the communication facilities.
CN200380100834.XA 2002-10-02 2003-10-01 Context information management in a communication device Pending CN1703698A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/263,446 2002-10-02
US10/263,446 US20040068502A1 (en) 2002-10-02 2002-10-02 Context information management in a communication device

Publications (1)

Publication Number Publication Date
CN1703698A true CN1703698A (en) 2005-11-30

Family

ID=32041994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200380100834.XA Pending CN1703698A (en) 2002-10-02 2003-10-01 Context information management in a communication device

Country Status (5)

Country Link
US (1) US20040068502A1 (en)
KR (1) KR20050050112A (en)
CN (1) CN1703698A (en)
AU (1) AU2003288913A1 (en)
WO (1) WO2004031993A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101529801B (en) * 2006-09-06 2013-10-23 雷德尼有限公司 Method and system for active profile services
CN105659246A (en) * 2013-10-18 2016-06-08 诺基亚技术有限公司 Method and system for operating and monitoring permissions for applications in an electronic device
CN106648024A (en) * 2010-11-18 2017-05-10 谷歌公司 Contextual history of computing objects

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7764784B2 (en) * 2004-09-08 2010-07-27 Cradlepoint, Inc. Handset cradle
US9232461B2 (en) * 2004-09-08 2016-01-05 Cradlepoint, Inc. Hotspot communication limiter
US8477639B2 (en) * 2004-09-08 2013-07-02 Cradlepoint, Inc. Communicating network status
US20070254727A1 (en) * 2004-09-08 2007-11-01 Pat Sewall Hotspot Power Regulation
US9294353B2 (en) * 2004-09-08 2016-03-22 Cradlepoint, Inc. Configuring a wireless router
US9584406B2 (en) * 2004-09-08 2017-02-28 Cradlepoint, Inc. Data path switching
US8732808B2 (en) * 2004-09-08 2014-05-20 Cradlepoint, Inc. Data plan activation and modification
US20090172658A1 (en) * 2004-09-08 2009-07-02 Steven Wood Application installation
EP1851651A2 (en) * 2005-02-11 2007-11-07 Critical Path Inc. Methods and systems for communicating digital content
US20080091489A1 (en) * 2005-06-27 2008-04-17 Larock Garrison J Acquiring, storing, and correlating profile data of cellular mobile communications system's users to Events
US7849154B2 (en) * 2005-06-27 2010-12-07 M:Metrics, Inc. Acquiring, storing, and correlating profile data of cellular mobile communications system's users to events
US8270942B2 (en) * 2005-09-06 2012-09-18 Redknee Inc. Method for the interception of GTP-C messages
US9344542B2 (en) * 2005-12-21 2016-05-17 Qualcomm Incorporated Techniques to generate context information
KR100792293B1 (en) * 2006-01-16 2008-01-07 삼성전자주식회사 Method for providing service considering user's context and the service providing apparatus thereof
WO2007143394A2 (en) * 2006-06-02 2007-12-13 Nielsen Media Research, Inc. Digital rights management systems and methods for audience measurement
US9021081B2 (en) * 2007-02-12 2015-04-28 Cradlepoint, Inc. System and method for collecting individualized network usage data in a personal hotspot wireless network
US8644272B2 (en) * 2007-02-12 2014-02-04 Cradlepoint, Inc. Initiating router functions
US8503991B2 (en) 2008-04-03 2013-08-06 The Nielsen Company (Us), Llc Methods and apparatus to monitor mobile devices
CN101686520A (en) * 2008-09-24 2010-03-31 三星电子株式会社 Method supporting home base station context management
EP2553557A4 (en) * 2010-03-31 2014-01-22 Hewlett Packard Development Co Contextual user interface
US8341185B2 (en) 2010-04-02 2012-12-25 Nokia Corporation Method and apparatus for context-indexed network resources
US9087213B2 (en) 2011-02-22 2015-07-21 Fedex Corporate Services, Inc. Systems and methods for rule-driven management of sensor data across geographic areas and derived actions
US8315620B1 (en) 2011-05-27 2012-11-20 The Nielsen Company (Us), Llc Methods and apparatus to associate a mobile device with a panelist profile
US10783481B2 (en) * 2012-03-22 2020-09-22 Fedex Corporate Services, Inc. Systems and methods for trip management
US10867061B2 (en) 2018-09-28 2020-12-15 Todd R. Collart System for authorizing rendering of objects in three-dimensional spaces

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
US6064973A (en) * 1998-04-17 2000-05-16 Andersen Consulting Llp Context manager and method for a virtual sales and service center
US6324551B1 (en) * 1998-08-31 2001-11-27 Xerox Corporation Self-contained document management based on document properties
EP0987893A1 (en) * 1998-09-16 2000-03-22 CANAL+ Société Anonyme Management of data in a receiver/decoder
WO2000044119A1 (en) * 1999-01-26 2000-07-27 Infolio, Inc. Universal mobile id system and method for digital rights management
US6442748B1 (en) * 1999-08-31 2002-08-27 Accenture Llp System, method and article of manufacture for a persistent state and persistent object separator in an information services patterns environment
JP2001175540A (en) * 1999-12-22 2001-06-29 Nec Corp Access right management system, portable terminal, gateway and contents server
EP1323018A4 (en) * 2001-06-07 2004-07-07 Contentguard Holdings Inc Protected content distribution system
US9635540B2 (en) * 2002-03-25 2017-04-25 Jeffrey D. Mullen Systems and methods for locating cellular phones and security measures for the same

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101529801B (en) * 2006-09-06 2013-10-23 雷德尼有限公司 Method and system for active profile services
CN106648024A (en) * 2010-11-18 2017-05-10 谷歌公司 Contextual history of computing objects
CN106648024B (en) * 2010-11-18 2020-05-22 谷歌有限责任公司 Contextual history of computing objects
CN105659246A (en) * 2013-10-18 2016-06-08 诺基亚技术有限公司 Method and system for operating and monitoring permissions for applications in an electronic device

Also Published As

Publication number Publication date
WO2004031993A1 (en) 2004-04-15
US20040068502A1 (en) 2004-04-08
KR20050050112A (en) 2005-05-27
AU2003288913A1 (en) 2004-04-23

Similar Documents

Publication Publication Date Title
CN1703698A (en) Context information management in a communication device
US9509674B1 (en) Information security and privacy system and method
EP1362467B1 (en) System for providing electronic contact information from a central source and method for updating contact information
CN101448211B (en) Wireless communication systems
CN101568104B (en) System and method for handshaking between wireless devices and servers
CN101588262B (en) Remote management of mobile wireless devices
CN109361638B (en) Method, system and storage medium for sharing control authority of intelligent device
CN101631138A (en) Personal information agent system and personal information agent method
CN1735886A (en) Privacy protection in a server
CN101702795A (en) System and method for sharing authority enabled user simple files
CN1722047A (en) Peer-to-peer neighbor detection for proximity-based command execution
CN111741017B (en) Data transmission method between internal network and external network and related equipment
CN1902568A (en) Method and system for managing access to presence attribute information
CN101155018A (en) Data synchronization method and its implementing device and system
CN102325367B (en) Data packet synchronizing device and method for client application
CN100505930C (en) Service class control system, service class control server and terminal device
JP2006507604A (en) System and method for managing permissions for use of information
CN101827347A (en) Communication method, communication system and access method to service provider base
EP1303153B1 (en) Apparatus and method for selecting software modules in a mobile terminal
KR20010070891A (en) As using internet, method and apparatus for updating a phone number information of a radio mobile phone and providing an additional service
CN113221177A (en) Data access method, device and system in distributed system
US7464135B2 (en) Point management server and point management system
CN111225342B (en) Method, system and medium for transmitting data to device by radio
CN101278261A (en) Electronic apparatus with server device for managing setting data
CN109951592B (en) Information processing method and device based on intelligent mobile terminal and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20051130